A remote attacker could entice a user to open a specially crafted font,
possibly resulting in execution of arbitrary code with the privileges of
the user running the application, or a Denial of Service condition.